-
Notifications
You must be signed in to change notification settings - Fork 1
Remove the node from still_have_not_sent_messages
if it sent an invalid message
#99
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Actually, I'm having second thoughts. The problem this PR attempts to fix was a problem in I think this logic is sound, and we can only update Also tagging @peg here to discuss the timeouts thing and who needs to be responsible for them. |
Do you mean second thoughts about adding the check in this PR? I would say any extra checks which can let us know strange things are happening are good, even if they can only happen when broken code (outside of this crate) is used. I don't have strong opinions on whether to put a timeout in manul or entropy-core. We could easily wrap the call to |
Yes, whether the logic this PR is trying to add is actually consistent with the rest of the error handling.
The check is being performed and the result is logged, the question here is whether it is possible that The problem with the timeout is that I still want to return the report when the timeout expires, and I'm not sure you can have an externally set timeout in |
I would say that we can be sure that messages originate from the node specified in the
Then probably it makes sense if the timeout is implemented in manul. Possibly with the desired |
I think a more flexible choice would be to take a cancellation token, allowing the user to set up the timeout or forced cancellation if needed. See #100 |
This is an interesting point actually. You may still want to encrypt the messages, but the CGGMP scheme specifically does not require it (everything that needs to be encrypted is already encrypted by the scheme itself). |
In draft, want to think a bit if we can only do this check once before branching out into correct/incorrect message processing.